what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-09.iis.linkview

asb00-09.iis.linkview
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-09) - Microsoft has released a procedure to eliminate a security vulnerability that could allow a malicious user to cause a web server to crash, or potentially run arbitrary code on the server, if certain permissions have been changed from their default settings to inappropriate ones. This is not a problem with ColdFusion Server itself, but it is an issue that can affect ColdFusion users. Allaire recommends that customers follow the instructions posted on the Microsoft Web site to address this issue.

tags | web, arbitrary
SHA-256 | d37d4eb5c51ea92c8c1526fd4f6f594f3d5a6e1b0bfd388cd9f32bae85d8ff8f

asb00-09.iis.linkview

Change Mirror Download
Allaire Security Bulletin (ASB00-09)
Microsoft Internet Information Server Procedure Available to Eliminate "Link View
Server-Side Component" Vulnerability

Originally Posted: April 24, 2000
Last Updated: April 24, 2000

Summary
Microsoft has released a procedure to eliminate a security vulnerability that could allow a
malicious user to cause a web server to crash, or potentially run arbitrary code on the server, if
certain permissions have been changed from their default settings to inappropriate ones. This is
not a problem with ColdFusion Server itself, but it is an issue that can affect ColdFusion users.
Allaire recommends that customers follow the instructions posted on the Microsoft Web site to
address this issue.

Issue
This issue is clearly explained in the Microsoft Knowledge Base: "Dvwssr.dll is a server-side
component used to support the Link View feature in Visual Interdev 1.0. However, it contains
an unchecked buffer. If overrun with random data, it could be used to cause an affected server
to crash, or could allow arbitrary code to run on the server in a System context."

Further: "By default, the affected component, Dvwssr.dll, resides in a folder whose permissions
only allow web authors to execute it. Under these conditions, only a person with web author
privileges could exploit the vulnerability - but a web author already has the ability to upload and
execute code of his choice, so this case represents little additional threat. However, if the
permissions on the folder were set inappropriately, or the .dll were copied to a folder with lower
permissions, it could be possible for other users to execute the component and exploit the
vulnerability."

Affected Software Versions

Any ColdFusion Server running on Microsoft Internet Information Server 4.0 or 5.0

What Allaire is Doing
This is not an Allaire product. We are recommending that customers reference the information
at Microsoft's site to address this issue.


What Customers Should Do
There are patches to correct this problem. These are detailed in the following Microsoft Security
Bulletin (MS00-025):

http://www.microsoft.com/technet/security/bulletin/ms00-025.asp

Please note: this issue and patch may not be required for all IIS users. Allaire customers
should review all material in the Microsoft Security Bulletin and related documents
carefully before applying the patch. As always, customers should test patch changes in
a testing environment before modifying production servers.

Revisions
April 24, 2000 -- Bulletin first created.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information
on how they can protect themselves. If you identify what you believe may be a security issue
with an Allaire product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products
or customers, we will notify customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response. Allaire customers who would
like to receive notification of new security bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
http://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING
DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close